Criterion-based access control is typically implemented by means of a pre-programmed ____.
A. authorization list
B. access control list
C. discretionary control list
D. access authorization list
Answer: B
Computer Science & Information Technology
You might also like to view...
What is the maximum number of simultaneous users that can access a Windows 7 share?
A) 20 B) 45 C) 60 D) 8 E) 10
Computer Science & Information Technology
For Ethernet, the MTU may range from ____.
A. 68 to 1300 B. 68 to 1500 C. 1300 to 1500 D. 68 to 9000
Computer Science & Information Technology
In C, relational expressions are evaluated to yield a boolean result.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Information is NOT the critical asset that organizations need to secure.
a. true b. false
Computer Science & Information Technology